Skip to content

Commit fbfb7e5

Browse files
committed
Normalize formatting.
1 parent bf55ced commit fbfb7e5

7 files changed

+15
-8
lines changed

SUMMARY.md

+5
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,15 @@
44
* [Binary Exploitation](/binary-exploitation.md)
55
* [Heaps of Knowledge \[420 points\]](/binary-exploitation/heaps-of-knowledge-420-points.md)
66
* [Cryptography](cryptography.md)
7+
* [Hash on Hash \[100 points\]](/cryptography/hash-on-hash-100-points.md)
8+
* [Security Through Obscurity \[150 points\]](/cryptography/security-through-obscurity-150-points.md)
79
* [RSA 4 \[200 points\]](/cryptography/rsa-4-200-points.md)
810
* [Genius \[230 points\]](/cryptography/genius-230-points.md)
11+
* [Premium RSA \[350 points\]](/cryptography/premium-rsa-350-points.md)
912
* [Paillier Service \[400 points\]](/cryptography/paillier-service-400-points.md)
1013
* [Forensics](forensics.md)
14+
* [Mane Event \[50 points\]](/forensics/mane-event-50-points.md)
15+
* [Petty Difference \[75 points\]](/forensics/petty-difference-75-points.md)
1116
* [Serial \[300 points\]](/forensics/serial-300-points.md)
1217
* [Decomphose \[325 points\]](/forensics/decomphose-325-points.md)
1318
* [Programming](programming.md)

cryptography.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@ This category focuses on using advanced mathematical topics to encrypt data to p
88
* Let Me Be Frank \[75 points\]
99
* RSA 2 \[80 points\]
1010
* Decode Me \[100 points\]
11-
* Hash on Hash \[100 points\]
11+
* [Hash on Hash \[100 points\]](/cryptography/hash-on-hash-100-points.md)
1212
* RSA 3 \[135 points\]
1313
* Diffie-cult \[140 points\]
14-
* Security Through Obscurity \[150 points\]
14+
* [Security Through Obscurity \[150 points\]](/cryptography/security-through-obscurity-150-points.md)
1515
* Lost Seed \[150 points\]
1616
* Listen Closely \[200 points\]
17-
* [RSA 4 \[200 points\]](/files/rsa4.txt)
17+
* [RSA 4 \[200 points\]](/cryptography/rsa-4-200-points.md)
1818
* [Genius \[230 points\]](/cryptography/genius-230-points.md)
19-
* Premium RSA \[350 points\]
19+
* [Premium RSA \[350 points\]](/cryptography/premium-rsa-350-points.md)
2020
* [Paillier Service \[400 points\]](/cryptography/paillier-service-400-points.md)
2121

2222

cryptography/Premium-RSA-350-points.md renamed to cryptography/premium-rsa-350-points.md

+1
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,7 @@ $ python3 premiumRSA.py
8585
easyctf{wow_i_pR0bABLY_5h0uldntA_l33k3d_d}
8686
```
8787
_All the flags have randomized 1337 speak, so your flag may vary_
88+
8889
### External Writeups
8990

9091
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Premium%20RSA/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Premium%20RSA/README.md)

cryptography/Security-Through-Obscurity-150-points.md renamed to cryptography/security-through-obscurity-150-points.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,7 @@ The intended solution involved learning what cryptosystem this is through google
8080

8181
A link for the cryptosystem given post-CTF on this cryptosystem is:
8282
https://www.di.ens.fr/~stern/data/St63.pdf
83-
### External Writeups
83+
84+
### External Writeups
8485

8586
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Security%20Through%20Obscurity/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Security%20Through%20Obscurity/README.md)

forensics.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@
33
This category refers to the recovery of information from evidence, like extracting information from corrupted files or uncovering hidden details in order to expose a secret. The forensics problems this year include:
44

55
* 20xx \[50 points\]
6-
* Mane Event \[50 points\]
6+
* [Mane Event \[50 points\]](/forensics/mane-event-50-points.md)
77
* scisnerof \[70 points\]
8-
* Petty Difference \[75 points\]
8+
* [Petty Difference \[75 points\]](/forensics/petty-difference-75-points.md)
99
* Flag Collection \[80 points\]
1010
* Zooooooom \[85 points\]
1111
* QR 1 \[100 points\]

reverse-engineering/hexqr-200-points.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ The goal was to figure out the encoding schema and decode the flag.
88

99
![](https://github.com/hgarrereyn/EasyCTF-2017-Write-ups/raw/1e81630e6b36e9caaa54b23e63e4d1e4f6f5c39e/hexqr/flag.png)
1010

11-
### Solution:
11+
### Solution
1212

1313
#### Overview
1414

0 commit comments

Comments
 (0)